top of page


  • Chris Bratton - Tech Journalist

Quantum computing prioritises cyber security: 0’s and 1’s of quantum cyber security

General computing takes in inputs such as 0’s and 1’s. These are traditional electric signals. Even though current generation computing is fast, it is nowhere near as fast as quantum computing. On the flip side, quantum computing prioritises cyber security, which again is great news.

How does cyber security occur? When cyber threats try to push security bounds by solving firewalls and similar fences and successfully manage to do so. At a quantum level, it is as hard as it is easy. Encryption based on mathematical formulas is an essential factor of computing.

Suppose we have to multiply two numbers, and both are large ones. One thing to do is simply multiply them, easy for our brain and the computer. Another way is to start with the large numbers and factor into two of its prime numbers. For quantum computers, both calculations are the same.

So, grinding through a complex algorithm is not an issue. It is what makes quantum computing so much more powerful and diverse. Though we haven’t seen the sheer scale of quantum computing, and it might take many years for public demonstration, the results are pretty fascinating.

Performance limitation is the foundation of today’s internet security. It needs something to achieve something. The same goes for cyber security. Furthermore, some sort of data is required to gather, and once enough information is collected, it just snowballs. Today we have encryption as the standard level of protection. It would take general computers hundreds of years to crack an encrypted, well-secured passcode without the key to decoding.

On the other hand, as fast as they are, quantum computers can grind through the same set of algorithms much quicker. Making today’s security seem like a funny story of yesterday. Computers force the 0 and 1 inputs as bits and chunk them together to form complex algorithms. These numbers are enormous, and the results are pretty instant. Suppose a sensor in your computer or smartphone needs to be triggered. In that case, those bits start the mechanism and execute accordingly.

We are familiar with Moore’s law, right? The same thing will be applied with quantum computing. Our encryption, which estimates cracking days as hundreds, even thousands of years, may take a few seconds at the quantum level. It sounds horrifying as it is fascinating.

Billions are invested by government, private entities and enterprises to tap into “game-changing” quantum computing power. To unleash such potential and keep it stable is a real challenge. But scantest worldwide, computer engineers, designers, mechanical engineers, programmers and other brilliant minds are banned together. Who thought humans would build spacecraft that would be reusable? Today, we plan to colocalize Mars. Making stable quantum computing may help us go far ahead in our limited time.

Quantum computers rely on public-key cryptographic algorithms at the moment. Which is secure and sensitive at the same time. Deborah Golde, the U.S. Cyber & Strategic Risk leader for Deloitte Risk & Financial Advisory, Debora Golden talked about quantum computing having “great potential.”

We may not realise it yet, but when the full power of quantum computing is unleashed, our healthcare, cybersecurity, finance, technology, communication, and everything that requires computing will go a few steps forward.

The U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) is the developer of superior frameworks, shoutout out by regulators and lawmakers. NIST will also issue a framework and guidelines for quantum computing level cybersecurity and privacy among other technical and manufacturing disciplines. It’s great that the rulings our thought out before we spectate a blow of quantum power in the real world.

Quantum-proof sectors and problems received 69 submissions, out of which 15 was shortlisted by July 2020. They are prime candidates for NIST to pick up and purpose it to post-quantum cryptography.


bottom of page